Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • My Bookmarks
    • Security Report
    • User Bookmark Dashboard
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Category: Threat Research

Threat Research

Analyzing AsyncRAT distributed in Colombia by Blind Eagle | Welcome to Jstnk webpage

May 20, 2022October 15, 2025 Securonix

An in-depth look at AsyncRAT campaigns tied to APT-C-36 and related RATs, focusing on evolving TTPs and how the Colombian distribution behaves in practice. The analyzed sample (Stub.exe) reveals anti-analysis checks, persistence via scheduled tasks and Run key…

Read More
Threat Research

To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions

May 20, 2022October 18, 2025 Securonix

UNC2165 is analyzed as overlapping with Evil Corp activities and shifting toward ransomware deployments such as HADES and LOCKBIT, leveraging FAKEUPDATES, BEACON, and post-exploitation techniques to breach networks while evading sanctions. The report traces th…

Read More
Threat Research

Browser-in-the Browser sextortion scam makes victims pay by imitating Indian Gov

May 18, 2022October 21, 2025 Securonix

A new Browser-in-the-Browser (BITB) sextortion campaign impersonates the Indian government to coerce victims into paying a fine with their credit card. The attack uses a full-screen fake browser window, browser fingerprinting, and a fraudulent payment flow to …

Read More
Threat Research

New Zero-day Exploit Spotted In The Wild – Cyble

May 18, 2022October 16, 2025 Securonix

Microsoft disclosed a new zero-day vulnerability in MSDT (CVE-2022-30190) that enables remote code execution. The exploit chain uses a malicious Word document to load a remote HTML file that runs PowerShell via the ms-msdt schema, with workarounds and indicato…

Read More
Threat Research

XLL Malware Distributed Through Email – ASEC BLOG

May 17, 2022October 14, 2025 Securonix

XLL malware is distributed via email attachments that masquerade as Excel add-ins (.xll) and run when opened, delivering various payloads including ransomware and info-stealers. The campaign uses DLL-based XLLs (some via Excel-DNA) and downloads additional mal…

Read More
Threat Research

Phishing Campaign Delivering Three Fileless Malware: AveMariaRAT / BitRAT / PandoraHVNC – Part II | FortiGuard Labs 

May 17, 2022October 14, 2025 Securonix

Fortinet’s FortiGuard Labs documented a phishing campaign that delivers three fileless malware to Windows hosts, enabling attacker control and data theft via a C2 channel. The payloads AveMariaRAT, PandorahVNC RAT, and BitRat steal credentials, capture screens…

Read More
Threat Research

Grandoreiro Banking Malware Resurfaces for Tax Season

May 17, 2022October 15, 2025 Securonix

Trustwave SpiderLabs observed a Grandoreiro campaign targeting bank users in Brazil, Spain, and Mexico during tax season, delivered via Portuguese-language phishing emails that link to a malicious PDF. The campaign uses a multifaceted payload chain—including a…

Read More
Threat Research

Patch Your WSO2: CVE-2022-29464 Exploited to Install Linux-Compatible Cobalt Strike Beacons, Other Malware

May 17, 2022October 16, 2025 Securonix

Trend Micro analyzes exploitation of CVE-2022-29464 in WSO2 products, which leads to web shell deployment and the installation of Linux-compatible Cobalt Strike beacons along with other malware. The campaign shows persistence across multiple products, uses web…

Read More
Threat Research

XLoader Botnet: Find Me If You Can – Check Point Research

May 17, 2022October 13, 2025 Securonix

Checkpoint researchers analyze the evolution of XLoader, focusing on how the botnet camouflages its real C2 servers among 64 decoy domains and how later versions smarterly rotate domains to evade analysis. The article details 2.5 and 2.6 updates that use proba…

Read More
Threat Research

Tandem Espionage – InQuest

May 16, 2022October 17, 2025 Securonix

The campaign distributes malicious documents that abuse an XML-driven download chain and legitimate payload hosting to deliver staged malware. It culminates with data-stealing payloads (Arkei Stealer and Eternity Stealer), using macro-based loaders and C2/down…

Read More
Threat Research

Black Basta Besting Your Network?

May 16, 2022October 15, 2025 Securonix

Black Basta ransomware is analyzed for its rapid network impact, data theft, and in-memory encryption with double extortion. IBM X-Force details the loader, behavior, and indicators to help defenders detect and mitigate this threat. Hashtags: #BlackBasta #IBMX…

Read More
Threat Research

Mirai Malware for Linux Double Down on Stronger Chips | CrowdStrike

May 16, 2022October 15, 2025 Securonix

CrowdStrike data show Mirai variants built for Intel-powered Linux systems more than doubling in Q1 2022 versus Q1 2021, with 32-bit x86 builds rising the most. Mirai continues to expand across Linux devices—from IoT to servers—by exploiting unpatched flaws su…

Read More
Threat Research

TURLA’s new phishing-based reconnaissance campaign in Eastern Europe

May 16, 2022October 14, 2025 Securonix

SEKOIA.IO Threat & Detection Research uncovers a Turla-led reconnaissance campaign targeting Eastern Europe, including the Baltic Defense College and the Austrian Economic Chamber. The operation relies on legitimate-looking Word documents that pull an external…

Read More
Threat Research

SocGholish Campaigns and Initial Access Kit

May 13, 2022October 16, 2025 Securonix

The article analyzes SocGholish (aka FAKEUPDATES) campaigns and how they function as a major initial-access vector through fake updates, compromised sites, and phishing-style techniques, detailing loader chains and observed IOCs. It covers campaigns delivering…

Read More
Threat Research

Spoofed Saudi Purchase Order Drops GuLoader: Part 1 | FortiGuard Labs 

May 13, 2022October 17, 2025 Securonix

Fortinet FortiGuard Labs analyzed a phishing email spoofing a Saudi Arabian oil company that lures a Ukrainian coffee company into downloading a GuLoader ISO via OneDrive. The static analysis shows the ISO contains a GuLoader NSIS installer with decoys and obf…

Read More

Posts pagination

Previous 1 … 473 474 475 … 489 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
  • X / T W I T T E R
  • B L U E S K Y
  • L I N K E D . I N
  • T H R E A D S
  • T E L E G R A M
  • F A C E B O O K

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.